{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T21:56:05Z","timestamp":1769032565226,"version":"3.49.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T00:00:00Z","timestamp":1761091200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T00:00:00Z","timestamp":1761091200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,10,22]]},"DOI":"10.1109\/cbmi66578.2025.11339279","type":"proceedings-article","created":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T20:38:56Z","timestamp":1768941536000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Anonymisation of Visual Lifelogs using Diffusion Models and Large Language Models"],"prefix":"10.1109","author":[{"given":"Minh-Quang","family":"Le","sequence":"first","affiliation":[{"name":"School of Computing, Dublin City University,Dublin,Ireland"}]},{"given":"Graham","family":"Healy","sequence":"additional","affiliation":[{"name":"School of Computing, Dublin City University,Dublin,Ireland"}]},{"given":"Liting","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Computing, Dublin City University,Dublin,Ireland"}]},{"given":"Cathal","family":"Gurrin","sequence":"additional","affiliation":[{"name":"School of Computing, Dublin City University,Dublin,Ireland"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1561\/1500000033"},{"key":"ref2","volume-title":"A privacy by design approach to lifelogging","author":"Gurrin","year":"2014"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"430","DOI":"10.1016\/j.pmcj.2017.03.003","article-title":"Analysing privacy in visual Iifelogging","volume":"40","author":"Ferdous","year":"2017","journal-title":"Pervasive and Mobile Computing"},{"key":"ref4","first-page":"50","article-title":"Using sensecam to capture children\u2019s exposure to food marketing: a feasibility study","volume-title":"Proceedings of the 4th International SenseCam amp; Pervasive Imaging Conference on - SenseCam \u201813, ser. SenseCam \u201913","author":"Barr"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.appet.2019.03.032","article-title":"The use of wearable cameras in assessing children\u2019s dietary intake and behaviours in china","volume":"139","author":"Zhou","year":"2019","journal-title":"Appetite"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.neurol.2016.03.009"},{"issue":"7","key":"ref7","doi-asserted-by":"crossref","first-page":"750","DOI":"10.1093\/eurjcn\/zvac053","article-title":"Now you see it! using wearable cameras to gain insights into the lived experience of cardiovascular conditions","volume":"21","author":"Nourse","year":"2022","journal-title":"European Journal of Cardiovascular Nursing"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2968219.2968320"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1108\/OIR-04-2018-0119"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3095713.3095736"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2196\/30517"},{"issue":"2","key":"ref12","first-page":"123","article-title":"Privacy-preserving techniques for lifelog data: A deep learning approach","volume":"15","author":"Lee","year":"2020","journal-title":"Journal of Privacy and Security"},{"issue":"4","key":"ref13","first-page":"567","article-title":"Gan-based anonymization of lifelog data","volume":"23","author":"Nguyen","year":"2021","journal-title":"IEEE Transactions on Multimedia"},{"key":"ref14","first-page":"1877","article-title":"Language models are few-shot learners","volume":"33","author":"Brown","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"key":"ref15","first-page":"6840","article-title":"Denoising diffusion probabilistic models","volume":"33","author":"Ho","year":"2020","journal-title":"Advances in Neural Information Processing Systems"},{"issue":"4","key":"ref16","first-page":"1","article-title":"Investigating the perception of facial anonymization techniques in 360\u00b0 videos","volume-title":"ACM Transactions on Applied Perception","volume":"21","author":"Wohler","year":"2024"},{"key":"ref17","first-page":"1333","article-title":"Cartooning for enhanced privacy in lifelogging and streaming videos","volume-title":"2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)","author":"Hassan"},{"key":"ref18","volume-title":"Privacy-protective-gan for face de-identification","author":"Wu","year":"2018"},{"key":"ref19","first-page":"685","article-title":"Introduction to the fifth annual lifelog search challenge, lsc\u2019 22","volume-title":"Proceedings of the 2022 International Conference on Multimedia Retrieval","author":"Gurrin"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3643489.3661114"},{"key":"ref21","volume-title":"Instructblip: Towards general-purpose vision-language models with instruction tuning","author":"Dai","year":"2023"},{"key":"ref22","volume-title":"Data Science","author":"Kotu","year":"2018"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898719574"},{"key":"ref24","volume-title":"Scaling rectified flow transformers for high-resolution image synthesis","author":"Esser","year":"2024"},{"key":"ref25","volume-title":"The llama 3 herd of models","author":"G.","year":"2024"},{"key":"ref26","article-title":"Sa2va: Marrying sam2 with llava for dense grounded understanding of images and videos","author":"Yuan","year":"2025","journal-title":"ar Xiv"},{"key":"ref27","volume-title":"Unsloth","author":"Han","year":"2023"},{"key":"ref28","author":"Najdenkoska","year":"2024","journal-title":"TULIP: Token-length upgraded CLIP"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-72983-6_18"}],"event":{"name":"2025 International Conference on Content-Based Multimedia Indexing (CBMI)","location":"Dublin, Ireland","start":{"date-parts":[[2025,10,22]]},"end":{"date-parts":[[2025,10,24]]}},"container-title":["2025 International Conference on Content-Based Multimedia Indexing (CBMI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11339229\/11339242\/11339279.pdf?arnumber=11339279","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T07:11:24Z","timestamp":1768979484000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11339279\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,22]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/cbmi66578.2025.11339279","relation":{},"subject":[],"published":{"date-parts":[[2025,10,22]]}}}